Beruflich Dokumente
Kultur Dokumente
, syrianes1
, and SEAOfcialChannel. These three channels belong to SEA since its Facebook
3
On its Twitter page, TCA has 44 followers with a rst tweet on 23 June 2013.
A.K. Al-Rawi / Public Relations Review 40 (2014) 420428 425
page gets removed continuously as explained above, so YouTube has become the only source where SEAs videos and
accompanying comments are retained online. These three YouTube channels contain similar videos, but they are believed
to be created in order to archive SEAs activities in case one of the channels is removed. syrianes1
in which the famous Syrian female singer, Assalah Nasri, refers to the Syrian national anthem and is framed as
if she belittled it (YouTube, 2012b).
5
One YouTuber, Ali Ahmed, criticized Nasri saying: Youre vain. Go and practice sexual
jihad with your great youth. . ... The reference to sexual jihad is repeatedly used by pro-Assad commentators to discredit
opposing views. This was a controversial fatwa that was issued by some sala ultraorthodox Muslim sheikhs and was
rejected by the majority of Sunni imams that allows Muslim women to practice sex with the ghters as part of the efforts
of establishing an Islamic state (BBC, 2013). On the other hand, hundreds of other commentators who oppose Assad and
SEA often make references to Muttah which means pleasure marriage that is a derogatory termused by some Sunnis to
discredit the Shiite doctrine. The Alawite regime of Bashar Assad is regarded as an offshoot of Shiism, and the above term
suggests that some Shiites are born as a result of illegitimate marriages (Haeri, 1989).
4
It had over 870,000 views and over 1400 comments as of December 11, 2013 and was posted on syrianes1 channel.
5
The video had over 1,045,000 views and 1174 comments as of December 11, 2013.
426 A.K. Al-Rawi / Public Relations Review 40 (2014) 420428
Further, one of the other popular terms used in the comments was the word mule (Jahsh in Arabic) to refer to Bashar
Assad whose name (Assad) means lion in Arabic; the mule is associated with stupidity and dullness unlike the ferociousness
and bravery of the lion. For example, one YouTube user, kuwaitiCharisma, stated: Bashar the mule, your end is near by
Gods will, and another YouTuber, shajkk, said: God curse your soul Hafez for bringing this mule. Hes the excrement of
lion. Since the conict in Syria has had regional implications that several other countries like Lebanon and Iraq, there were
other political usages of the word Jahsh. For example, a Saudi lmproducer, Mohammed Al-Qahttani, announced his plan
to make Al-Jahsh lm to depict the villainy and violence practiced by the Assad family throughout their rule. The Saudi
lm is planned as a reaction to making an anti-Saudi lm called King of the Sands by the Syrian director, Najdat Anzour,
which was screened in several cinema theaters in Damascus and negatively depicted the life of King Saud of Saudi Arabia
(Al-Qudus Al-Arabi, 2013). Further, the self-proclaimed geographic locations of the comments also indicate that people from
different places inside and outside the Arab region are involved in the exchange of the sectarian language. As shown above,
SEA reacted against the website of many Arab countries whose political stances opposed that of Assads government. Yet,
various other hacking incidents were documented; for example, the website of the Iraqi Prime Minster, Nouri Maliki, was
defaced and hacked by a group calling themselves TeamKuwait Hackers who compared himto Bashar Assad because of
the Iraqi governments support for Assads regime. The statement posted on Malikis website mentioned: You want to be
like Bashar Assad . . . Bashar is over (Associated Press, 2013).
To answer the second research question: What is the tone of the online reaction toward the videos posted by SEA on
its three YouTube channels? The results of the study showed that the majority of the comments 71.9% (n=1703) were Pro-
SEA and/or pro-Assad. As mentioned earlier, there seems to be some kind of comments moderation. Most of these pro-SEA
comments were directedat praising the hacking operations andBashar Assads government. It is noteworthy to mentionthat
there is a clear support bySyrians livinginthe diaspora andmanyother non-SyrianArabs livingindifferent parts of the world.
This is also supported by the results of the geographic locations of the commentators. Amongst those sympathizers, there is
a clear sectarian afliation with SEA which is part of the Alawite Shiite regime of Assad. For example, Hussein Al-Zubaidi,
said: Be victorious Bashar; all Shiites are under your service, while ArmyShiaTeam, that seems to be another hacking
group called SEA heroes and urged them to continue their efforts. Other comments were directed at demeaning Sunni
Wahabis, Qatar, and Saudi Arabia due to their support for the Sunni rebels who are repeatedly accused of being terrorists,
agents for Israel and the US, and mercenaries. Other commentators like Samer Al-Tariq fromIraqs Karbala, harriwaltan from
Germany, and Djesami algerien fromAlgeria all praised SEAand encouraged it to continue based on sectarian or nationalistic
reasons.
Further, most of the Pro-SEA active commentators link the gure of Bashar Assad and his father Hafez with SEA. For
example, the YouTuber, salem mhnna, who seems to be a SEA member praises the group, saying: Were the eagles. . .our
hearts are solid. . .going forward without withdrawing. . ..Were the falcons of Assads Syria. In another post, he said: SEAs
Facebook page was shut down 169 times and this is the 169th. The process will continue. . ..Damn you, youll never pass
and Syria will never kneel. We remain resolved until the established victory. Also, there is a clear link made in the posts
between Syrias real army and its virtual one. For example, one YouTuber who seems to be a SEA member, sea Syria, says: If
you come on the ground. . ..or by sea. . .or by air. . .or on the net, you will be crushed and your dreams will be squashed with
it because we are more than you and are on the right side. In addition, sami mhnna, another YouTuber mentions: Let God
have mercy on the martyrs of the Arab Syrian Army, the doctrinal and electronic army. Interestingly, some of the statements
mentioned mimic those used by Anonymous in Style; for example, nahla ja, says: ImSyrian. . .Imunarmed. . .I resist. . .Im
the Syrian Electronic Army, while another YouTuber, SyrianLeaks2011, who appears to be a SEA member mentions: We
were not able to carry arms to protect our homeland, so we are here on this arena which is not less violent; we are certain
of victory. . ..
As for the anti-SEA and/or anti-Assad views, they constituted 25.3% of the total number of comments. Similar to the
pro-SEA comments, the language used against SEA and Assad is highly sectarian and full of curses and insults. For example,
one YouTuber, nasser35age, says: The killer [Assad] is immortal in Hells re. The day Syria sawyou, there was nothing good
but sectarianism and grudge. Another YouTuber, MRaboFaisal1, used a sectarian language: God curse you, Radah, and
above all you dead Hafez, the shitty. Here, Radah is one pejorative termgiven to Shiite by some salas. Other users (goog50
and Al Dharif) wondered why SEA and Syrias Assad asked help fromIran and Hezbollah to ght the rebels if they were truly
strong enough to defend Syria alone. Hezbollah which means (Gods Party) in Arabic is repeatedly termed as (Lats Party).
Here, Lat is a reference to one of the pre-Islamic polytheistic gods that Arabs used to worship and is intentionally replaced
here in order to discredit the doctrinal basis of the Shiite Hezbollah. Also, the Shabiha and Syrians with pro-Assad views are
often accused of being Irans proxies and are repeatedly called Bashars slaves or worshippers. Also, SEA is often mocked,
while the validity of its hacking operations is either belittled or questioned. For instance, the YouTube user, AbuAlhassanSy,
stated: Let the kids [SEA members] play around on the net, while the adults are busy on the ground until the corrupt regime
falls, while, sourihorr, another YouTuber said: This is the donkeys electronic army in reference to one of SEAs hacking
claims.
In relation to neutral comments, they constituted the lowest percentage (2.7%) as the majority of the comments were
highly polarized. These comments encouraged peace and understanding and neither praised nor denounced SEA. For exam-
ple, one YouTuber, a0562116637, condemnedthe violent language andsectarianrhetoric stating: Basedonthese comments,
I understand nowwhy we are labeled as Third World countries. Another YouTube user, abdul k hetar, said: By God, I feel
surprised by the kind of insults and curses I read. Is this the kind of moral standard held by the faithful Muslims?.
A.K. Al-Rawi / Public Relations Review 40 (2014) 420428 427
In conclusion, the case of the Syrian Electronic Army can be applied to the several other totalitarian regimes, possibly like
North Korea, that use cyber warriors as an online public relations tool either to steal information fromopposition groups or
hack websites and SNSs outlets aiming at creating an image of a sophisticated and undefeatable regime. This can be part of
the cyber war tactics that are used for offensive and defensive purposes. SEA effectively used cyberspace to defend, support,
and popularize the Assad regime, and some its strategies were unorthodox. It is crucial to mention here that SEAs case
remains unique due to the special circumstances that led to its creation. Stromback and Kiousis emphasize the importance
of examining the cultural, social, political, institutional, or systemic context (2011, p. 4) as well as the different beliefs,
values and attitudes and congurations of social, economic and political factors (Edwards & Hodges, 2011, p. 3) that all
play a major role in shaping the nature and goals of public relations efforts.
Further, the Syrian government uses cyber war is part of its tools to protect its own interests similar to other governments
around the world. SEA is one of Assads government means to attack vital targets in the cyber space that adds prestige and
enhances an image of a sophisticated regime that is able to create havoc in the West. This image has an impact on the public
relations efforts directed at the Syrianpublic in particular and the Arab and international public in general. The study showed
that SEA is a highly organized group of cyber warriors whose goal is to serve Bashar Assads government by either stealing
sensitive information for intelligence purposes that can help in combating the Syrian rebel groups or hacking the websites
of international media outlets or their social media channels in order to draw international attention to Assads cause. SEA
uses all the available tools at its disposal to spread the word on the activities of Assads Syrian army and to distort the image
of Syrian rebels which is similar to the general objectives of the ofcial Syrian media outlets. It is reasonable to think that
SEAs future will always be linked to the fate of Bashar Assad and his Baath government.
Acknowledgement
I would like to thank my wife. Dr. Alaa Al-Musalli, for her kind assistance in conducting this research study as she was
one of the coders in the pilot study.
References
Al-Qudus Al-Arabi. (2013 January). After announcing the Al-Jahyesh lm, Syrian authorities ban the entrance of all Saudi cars into the country. Retrieved from
http://www.alquds.co.uk/?p=118920
Al Jazeera. (2013 September). Report: US hacked Al Jazeera communications. Retrieved from http://www.aljazeera.com/news/middleeast/2013/09/
20139113658335421.html
Al-Rawi Ahmed, K. (2012). Media practice in Iraq. Hampshire: Palgrave Macmillan.
Anonymous. (2013 August). Anonymous syria ghting for freedom. Retrieved fromhttp://vimeo.com/75158017
Arthur, C. (2013, February 26). Symantec discovers 2005 US computer virus attack on Iran nuclear plants. The Guardian,. Retrieved from
http://www.theguardian.com/technology/2013/feb/26/symantec-us-computer-virus-iran-nuclear
Associated Press. (2012, September 9). Al Jazeera says hackers sent false mobile texts. Retrieved from http://news.yahoo.com/al-jazeera-says-hackers-
sent-false-mobile-texts-154921087.html
Associated Press. (2013, February 12). Hackers call Iraqi PM oppressor on his website. Retrieved from http://news.yahoo.com/hackers-
call-iraqi-pm-oppressor-website-111725197.html
Baldi, S., Gelbstein, E., &Kurbalija, J. (2003). Hacktivism, cyber-terrorismandcyberwar: The activities of the uncivil societyincyberspace. Msida: DiploFoundation.
Baldor, L. (2012, October 12). US: Hackers in Iran responsible for cyberattacks. Associated Press. Retrieved from http://news.yahoo.com/us-hackers-iran-
responsible-cyberattacks-072429280nance.html
BBC. (2013, October 26). Tunisias sexual jihad extremist fatwa or propaganda? Retrieved fromhttp://www.bbc.co.uk/news/world-africa-24448933
Bernays, E. L. (1952). Public relations. Norman, OK: University of Oklahoma.
Booth, R., & Mahmood, M. (2012, March 14). How the Assad emails came to light. The Guardian,. Retrieved from http://www.theguardian.
com/world/2012/mar/14/how-assad-emails-came-light?guni=Article:in%20body%20link
Budihan. (2013, April 10). An Algeria Hacker narrates to Asharq Al-Awsat the details of the Cyberwar against Israel. Asharq Al-Awsat. Retrieved from
http://www.aawsat.com/details.asp?section=4&issueno=12552&article=724133&feature=#.UqW4ZtK1zTo
Cameron, D. (2013, November 16). Jeremy Hammond supporters share list of countries the FBI allegedly used him to hack. Retrieved from
http://www.dailydot.com/news/jeremy-hammond-fbi-foreign-governments-list/
Carroll, C. E., & McCombs, M. (2003). Agenda-setting effects of business news on the publics images and opinions about major corporations. Corporate
Reputation Review, 6(1), 3646.
Copeland, D., & Potter, E. H. (2008). Public diplomacy in conict zones: Military information operations meet political counter-insurgency. Hague Journal of
Diplomacy, 3(3), 277297.
Deans, J., Plunkett, J., & Halliday, J. (2013, March 21). BBC Weather Twitter account taken over by Syrian regime supporters. The Guardian,. Retrieved from
http://www.theguardian.com/media/2013/mar/21/bbc-weather-twitter-syrian-regime
Denning, D. E. (2001). Activism, hacktivism, and cyberterrorism: The Internet as a tool for inuencing foreign policy. In J. Arquilla, & D. Ronfeldt (Eds.),
Networks and netwars: The future of terror, crime, and militancy (pp. 239288). Rand Corporation.
Edwards, Lee. (2009). Public relations theories: An overview. In R. Tench, & L. Yeomans (Eds.), Exploring public relations (pp. 149173). Essex: Pearson
Education.
Edwards, L., & Hodges, C. (2011). Introduction: Implications of a (radical) socio-cultural turn in public relations scholarship. In L. Edwards, & C. Hodges
(Eds.), Public relations, society & culture: Theoretical and empirical explorations (pp. 114). London: Routledge.
Fawkes, J. (2009). Public relations, propaganda and the psychology of persuasion. In R. Tench, & L. Yeomans (Eds.), Exploring public relations (pp. 252272).
Essex: Pearson Education.
Ferran, L. (2012, October 15). Researchers: Cyber Attack MiniFlame Hit Lebanon, Iran. ABC News. Retrieved from http://abcnews.go.com/
blogs/headlines/2012/10/miniame-researchers-say-extremely-targeted-cyber-attack-hit-lebanon-iran/
Fire Eye. (2013, July 30). Syrian Electronic Army hacks major communications websites. Retrieved from http://www.reeye.com/
blog/technical/cyber-exploits/2013/07/syrian-electronic-army-hacks-major-communications-websites.html
Flangan, B. (2012, June 5). Sophisticated ame computer virus detected in UAE. The National,. Retrieved from http://www.thenational.ae/business/
industry-insights/technology/sophisticated-ame-computer-virus-detected-in-uae
Freitang, A. R., & Stokes, A. Q. (2009). Global public relations: Spanning borders, spanning cultures. London: Routledge.
428 A.K. Al-Rawi / Public Relations Review 40 (2014) 420428
Gellman, B., & Nakashima, E. (2013, August 31). U.S. spy agencies mounted 231 offensive cyber-operations in 2011. Documents show. The Washington Post.
Haeri, S. (1989). Law of desire: Temporary marriage in Shii Iran. NewYork: Syracuse University Press.
Hallahan, Kirk. (2004). Online public relations. In L. Robert, & Heath (Eds.), Encyclopedia of public relations (pp. 587592). California: Sage Publications.
Harris, S. (2009, November 14). The Cyberwar Plan. National Journal Magazine. Retrieved from http://www.nationaljournal.com/member/magazine/the-
cyberwar-plan-20091114
Heussner, K. M. (2010, September 13). Hacker Posts video claiming Here You Have worm. ABC News. Retrieved from http://abcnews.go.
com/Technology/anti-us-hacker-claims-worm/story?id=11624252
Hughes, D. (2012, May 23). Hillary Clinton: U.S. hacked Yemen al-Qaida sites. ABC News. Retrieved from http://abcnews.go.com/blogs/
headlines/2012/05/secretary-clinton-we-hacked-yemen-al-qaeda-sites/
International Telecommunication Union. (2012). Connect Arab Summit 2012: Connecting the unconnected by 2015: ICT Adoption and Prospects in the Arab
Region. CH-1211 Geneva, Switzerland: International Telecommunication Union.
Kunczik, M. (2003). Transnational public relations by foreign governments. In K. Sriramesh, & D. Vercic (Eds.), The global public relations handbook: Theory,
research, and practice (pp. 399424). London: Routledge.
Landis, J. R., & Koch, G. G. (1977). The measurement of observer agreement for categorical data. Biometrics, 33(1), 159174.
LEtang, Jacquie. (2008). Public relations: Concepts, practice and critique. London: Sage.
Lombard, M., Snyder-Duch, J., & Bracken, C. C. (2002). Content analysis in mass communication: Assessment and reporting of intercoder reliability. Human
Communication Research, 28(4), 587604.
Lordan, E. J. (2001). CyberSpin: The use of new technologies in public relations. In R. L. Heath (Ed.), Handbook of public relations (pp. 582590). Thousand
Oaks, CA: Sage.
Memmot, M. (2013, April 16). NPR.org Hacked; Syrian Electronic Army Takes Responsibility. NPR. Retrieved from http://www.npr.org/blogs/
thetwo-way/2013/04/16/177421655/npr-org-hacked-syrian-electronic-army-takes-credit
Murphy, L. (2013, September 4). Anonymous isnt ready to publish the identities of the Syrian Electronic Armyyet. The Daily Dot,. Retrieved from
http://www.dailydot.com/news/anonymous-syrian-electronic-army-names/
Reporters without Borders. (2013, March12). Enemies of the Internet: 2013 Report. Retrievedfromhttp://surveillance.rsf.org/en/wp-content/uploads/sites/2/
2013/03/enemies-of-the-internet 2013.pdf
Richelson, J. T. (2013, April 26). National Security Agency tasked with targeting adversaries computers for attack since early 1997. According to declassied
document. National Security Archive Electronic Brieng Book No. 424. Retrieved fromhttp://www2.gwu.edu/ nsarchiv/NSAEBB/NSAEBB424/
Rojas, P. (2003, April 24). The paranoia that paid off. The Guardian.
Scharr, J. (2013, September 1). What is the Syrian Electronic Army. Live Science,. Retrieved fromhttp://news.yahoo.com/syrian-electronic-army-123906820.
html
Sha, B.-L. (2007). Dimensions of public relations: Moving beyond traditional public relations models. In S. Duhe (Ed.), New media and public relations (pp.
326). NewWork: Peter Lang.
Signitzer, B. H., & Coombs, T. (1992). Public relations and public diplomacy: Conceptual covergences. Public Relations Review, 18(2), 137147.
Snow, G. M. (2011, April 12). Statement before the Senate Judiciary Committee, Subcommittee on Crime and Terrorism, Washington, D.C.
The FBI Cybersecurity: Responding to the threat of cyber crime and terrorism. Retrieved from http://www.fbi.gov/news/testimony/
cybersecurity-responding-to-the-threat-of-cyber-crime-and-terrorism
Spillius, A. (2009, December 17). Iraq insurgents hacked Predator drone video feed. The Telegraph,. Retrieved from http://www.telegraph.co.uk/news/
worldnews/middleeast/iraq/6834884/Iraq-insurgents-hacked-Predator-drone-video-feed.html
Sriramesh, K., & Vercic, D. (2003). A theoretical framework for global public relations research and practice. In K. Sriramesh, & D. Vercic (Eds.), The global
public relations handbook: Theory, research, and practice (pp. 122). London: Routledge.
Stromback, J., & Kiousis, S. (2011). Political public relations: Dening and mapping an emergent eld. In J. Stromback, & S. Kiousis (Eds.), Political public
relations: Principles and applications (pp. 132). London: Routledge.
Sweetser, K. (2011). Digital political public relations. In J. Stromback, & S. Kiousis (Eds.), Political public relations: Principles and applications (pp. 293313).
London: Routledge.
The Algerian Electronic Army. (2013, May 23). Facebook. Retrieved fromhttps://www.facebook.com/AlgerianElectronicArmy
The Guardian. (2013, June 28). Former US general James Cartwright named in Stuxnet leak inquiry. Retrieved from http://www.theguardian.
com/world/2013/jun/28/general-cartwright-investigated-stuxnet-leak
The Syrian Electronic Army. (n.d.). About. Retrieved fromhttp://sea.sy/index/ar
The Syrian Electronic Army. (2013a). Twitter. Retrieved fromhttps://twitter.com/Ofcial SEA16
The Syrian Electronic Army. (2013b, December 5). Our Facebook Page number 260. Retrieved fromhttp://sea.sy/article/id/2023/ar
The Syrian Electronic Army. (2013c). Facebook. https://www.facebook.com/SEA.P.260
The Tunisian Cyber Army. (2013). Retrieved fromhttps://twitter.com/TN Cyberarmy
The Wire. (2013, April 7). Anonymous Hits Israel with a Massive Cyber Attack, Israel Attacks Back. Retrieved from http://www.thewire.com/
global/2013/04/anonymous-hits-israel-massive-cyber-attack-israel-attacks-back/63969/
Thelwall, M. (2009). Introduction to Webometrics: Quantitative Web Research for the Social Sciences. San Rafael, CA: Morgan & Claypool.
YouTube. (2011a, May 11). Syrianes1. Retrieved fromhttp://www.youtube.com/user/syrianes1/about
YouTube. (2011b, May 23). The Good Morning Programon Dunya TV. . .Thank you. Retrieved fromhttp://www.youtube.com/watch?v=yZzmMmTb6wQ
YouTube. (2011c, June 7). Syrianes0. Retrieved fromhttp://www.youtube.com/user/syrianes0/about
YouTube. (2012a, July 18). Anonymous website hacked and defaced by SEA. Retrieved fromhttp://www.youtube.com/watch?v= EGqCjHm5jE
YouTube. (2012b, July 28). Assalah Nasri mocks the anthem of her home country and Tonny scolds her. Retrieved from http://www.youtube.
com/watch?v=InmbgpaFGcQ
YouTube. (2012c, August 10). The Video that made everyone who saw it cry The Syrian Arab Army. Retrieved from
http://www.youtube.com/watch?v=LnwfKBFdFxc
YouTube. (2013a). SEAOfcialChannel. Retrieved fromhttp://www.youtube.com/user/SEAOfcialChannel/about
YouTube. (2013b, March 1). Hacking Qatar Foundation SEA. Retrieved fromhttp://www.youtube.com/watch?v=BCBWkNgBTZc
YouTube. (2013c, September 23). Al-Mayadeen Fromthe ground SEA. Retrieved fromhttp://www.youtube.com/watch?v=gBRZRnzIi3w
Valeriano, B., & Maness, R. (2012, November 21). The fog of cyberwar: Why the threat doesnt live up to the hype. Foreign Affairs. Retrieved from
http://www.foreignaffairs.com/articles/138443/brandon-valeriano-and-ryan-maness/the-fog-of-cyberwar
Ventre, D. (2011). Cyberware and information warfare. London: John Wiley & Sons.
Weimann, G. (2005). Cyberterrorism: The sumof all fears? Studies in Conict & Terrorism, 28(2), 129149.
Wikileaks. (2004). Indo-US cyber security forum preparatory consultations in New Delhi. E.O. 12958. US Embassy New Delhi. Retrieved from
http://wikileaks.org/cable/2004/11/04NEWDELHI7026.html
Wikileaks. (2009). SECNAV, GOJ ofcials discuss Unshakeable alliance, China concerns. US Embassy Tokyo. E.O. 12958. 27 August. Retrieved from
http://wikileaks.org/cable/2009/08/09TOKYO2002.html
Wimmer, R. D., & Dominick, J. R. (1994). An introduction to mass media research. California: Wadsworth.